1.4 computer science !

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/43

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

44 Terms

1
New cards

what is malware?

malicious software

2
New cards

threats caused by malware?

keylogs, internet connections are slower, deleting, encrypting and corrupting files (computers crash)

3
New cards

viruses are only activated when ….

programs are run

4
New cards

how do viruses spread?

they replicate themselves and attach themselves to other files

5
New cards

what is the danger of a virus?

they corrupt data and change a system until it cant work anymore

6
New cards

worms don’t need ____ to spread

an infected file or human interaction

7
New cards

what can worms do?

replicate themselves and spread by finding weaknesses in software

8
New cards

what are trojans?

malware that looks like legitimate software

9
New cards

what do trojans do?

give attacker secret access to system

10
New cards

trojans cannot ____

replicate or infect or files

11
New cards

what does ransomware do?

locks users’ files with encryption

12
New cards

why do hackers do ransomware?

so they can demand digital currencies (which are harder to trace) to decrypt data

13
New cards

what is social engineering?

tricking victims into giving personal data or access to systems (by pretending to be a legitimate source)

14
New cards

what is phishing?

gaining information by pretending to be a legitimate source

15
New cards

what is shoulder surfing?

obtaining personal information by watching them

16
New cards

what is theft here?

physically stealing security keys or laptops or USB sticks (or data stolen by companies)

17
New cards

what is data interception ?

when data packets are intercepted, copied and sent to a different location during transmission

18
New cards

what software is used to intercept and analyse data packets?

packet sniffers

19
New cards

which type of communication is harder to intercept?

wired

20
New cards

what are denial of service attacks ? (DoS)

when a computer repeatedly sends requests to a server to overload and slow it down

21
New cards

what do DoS attacks aim to do?

websites so users are denied the service

22
New cards

what are impacts to websites after a Dos attack?

loss of revenue, lower productivity, reputation damage

23
New cards

what is a DDoS attack?

distribution denial of service attack

24
New cards

how does a DDoS attack work?

botnets (users are unaware and a large group of devices are controlled by attacker) to send requests to a server

25
New cards

what is SQL injection?

input malicious SQL code into data input sections

26
New cards

how is SQL injection a threat?

hacker can be given administrative rights or extract database info (leak it or hold for ransom)

27
New cards

how do penetration tests help?

finding weaknesses in a system or network so they can be fixed before exploited

28
New cards

what can penetration testing help against?

SQL injection, Brute force attacks, Hacking

29
New cards

how does anti-malware software help?

scans files and programs to a database of known malware signatures

30
New cards

what else can anti-malware software do?

remove suspicious files

31
New cards

what can anti-malware be used against?

malware (trojan, worms, viruses, ransomware)

32
New cards

what does a firewall do?

monitors and controls incoming/outgoing network traffic

33
New cards

how does a firewall help?

blocks unauthorised access + allows safe data through

34
New cards

what can firewalls be used against?

malware, DoS attack and unauthorised access

35
New cards

what do user access levels do?

controls what users can see or do on network, providing different permissions

36
New cards

how do user access levels help?

prevents accidental misuse / keeps sensitive data secure

37
New cards

what can user access levels be used against?

SQL injections, malware and unauthorised access

38
New cards

how do passwords help?

it makes it harder for attackers to guess or crack log in credentials

39
New cards

what do passwords help against?

brute force attacks, unauthorised access and data theft

40
New cards

what is encryption?

scrambling data into an unreadable format with a key, so it cant be understood if intercepted during transmission

41
New cards

what can encryption help against?

data interception and theft

42
New cards

what does physical security do?

restrict access to systems and network hardware

43
New cards

what does physical security include?

security keys, biometrics, cameras and staff

44
New cards

what does physical security help against?

data theft and prevents unauthorised access